Phishing is an increasingly devious, almost artistic, threat. The ultimate goal is to trick a target into either downloading malware or disclosing personal or corporate information through social engineering, email spoofing and content spoofing efforts. Having snared an individual, there are a number of ways they can be exploited – from personal identity theft, to large scale corporate breaches. Phishing is thought to have originated around 1995, but it was in 2005 that it become more widely recognised as an attack vector. Ten years later and phishing is still an issue. Phishing Evolution ‘Phishers’ cast their nets wide, playing a…
Author: ISBuzz Team
Ofcom has experienced the largest data breach it’s ever faced after an employee offered private data on TV companies to his new employer – A major broadcaster. Ofcom has sent letters to a number of affected TV companies informing them of the breach. You can read the full story here. Here to comment on this news is data protection expert Luke Brown from Digital Guardian. Comment from Luke Brown, VP and GM EMEA, India and LatAm “The Ofcom incident just goes to show that regardless of any defensive perimeter security, without taking steps to secure the data itself organisations can still fall…
Advertisements and marketing are inseparable concepts. It’s embedded e-commerce content that allows various online services to exist without charging their customers a penny. There are unspoken guidelines that the interested parties follow along the way, such as avoiding the redundancy of ads and only promoting commodities that are safe. Ideally, these campaigns aren’t overly intrusive, both the service providers and the end users are satisfied. This remarkable equilibrium, however, is amazingly easy to disrupt. Malicious programs categorized as adware drastically diminish one’s online experience by injecting obnoxious ads into all websites that the person visits. Note the fundamental difference between…
New ransomware infecting Apple OS X surfaced on March 4 2016, with the emergence of KeRanger. The first inkling of trouble came at the weekend. Users of Transmission – a BitTorrent client widely used on OS X – might have noticed the following warning: According to the warning, which was displayed within the Transmission application and on its website, version 2.90 of the application was infected. All users were recommended to upgrade immediately to 2.91, as they might have fallen victim to new file-encrypting ransomware to target OS X – dubbed KeRanger. Analysis of this threat was first published by…
The planets are aligning against the privacy of every individual who uses a healthcare system; those planets being complexity and new technologies. Modern medicine has to deal with massive numbers of patients and the routes taken by patient data are often highly convoluted, complex and open to error. As the system currently stands, patient information is shared between what amounts to, a small eco-system of associated actors. These include: employers, lawyers, insurance companies, general practitioners, pharmacies and hospitals. The image below shows some work carried out to quantify the complexity of the data sharing eco-system – this shows the pathway…
Ordinarily, falling victim to a ransom plot means that you are the son or daughter of some wealthy person and the only way to get out of it is by paying tons of money or waiting for Arnold Schwarzenegger or Kurt Russell to come and rescue you, or, at least, that’s what TV would have us believe. These days being held for ransom can actually happen quite differently with your computer of all things. I’m talking of course about ransomware, a particularly diabolical type of malware, that is to say, bad software, that’s been making headlines recently. Here’s how it…
Many of the modern gifts are digital products like notebooks, ultrabooks, tablets, smartphones. How do we protect our children when they go online? According to the latest statistics, our children are spending over 9 hours a day connected. Think how scary that statistic is, 9 hours! You are probably asking yourself what are they doing all that time, and how much information are we really giving them in order to understand how to use the Internet securely? Staying on top of dangerous apps that your kids shouldn’t be downloading is crucial. And now there’s a way that kids can hide…
Logitech issued the following statement in response to a report on Logitech’s Unifying receiver. The Unifying receiver allows a user to connect multiple compatible keyboards and mice to a laptop or desktop computer with a single USB receiver. Asif Ahsan, senior director, engineering at Logitech have the following comments on it. [su_note note_color=”#ffffcc” text_color=”#00000″]Asif Ahsan, Senior Director, Engineering at Logitech: “Bastille Security recently approached us regarding our Unifying receiver. We have been in regular communication with them since and together have discussed their findings. Bastille Security identified the vulnerability in a controlled, experimental environment. The vulnerability would be complex to…
Yesterday’s Patch Tuesday release fixes critical flaws affecting every version of Windows. This month’s bumper release of security patches has one bulletin that affects every supported version of Windows. Craig Young, security researcher at Tripwire explains that the March bulletin should generally be straightforward to patch. Additionally, I have pasted some research into enterprise patch management from Tripwire which discloses that 50% of IT professionals are struggling to keep up with client-side patches. [su_note note_color=”#ffffcc” text_color=”#00000″]Craig Young, Cybersecurity Researcher at Tripwire : “System administrators will be relieved that the March bulletin should be generally straightforward as it does not contain…
NNT review and discuss the range of Cyber Security Threats predicted by analysts and vendors and present a Top Ten of Cyber Security Safety Measures. Drinking kale and beetroot smoothies isn’t one of them, but to find out why not, and to see what did make the list, read on… “To begin with we consulted a number of expert sources. As with many of these prescient type reports, conjecture and guesswork certainly play their part. That said there is enough fact based on current trends and previously observed activity to take all this very seriously indeed.” What Does Experian Think?…